First published: Tue Aug 13 2019(Updated: )
A vulnerability was found in http/2 where an attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.29-41.jbcs.el6 | 0:2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-1.jbcs.el6 | 0:1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el6 | 0:1.6.3-63.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el6 | 0:1.6.1-48.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el6 | 0:1.0.6-7.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el6 | 0:7.64.1-14.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el6 | 0:2.4.37-33.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el6 | 0:2.11-20.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el6 | 0:1.39.2-4.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el6 | 1:1.1.1-25.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-41.jbcs.el7 | 0:2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-1.jbcs.el7 | 0:1.39.2-1.jbcs.el7 |
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el7 | 0:1.6.3-63.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el7 | 0:1.6.1-48.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el7 | 0:1.0.6-7.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el7 | 0:7.64.1-14.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el7 | 0:2.4.37-33.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el7 | 0:2.11-20.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el7 | 0:1.39.2-4.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el7 | 1:1.1.1-25.jbcs.el7 |
redhat/httpd24-httpd | <0:2.4.34-8.el6.1 | 0:2.4.34-8.el6.1 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6.1 | 0:1.7.1-7.el6.1 |
redhat/rh-nodejs10 | <0:3.2-3.el7 | 0:3.2-3.el7 |
redhat/rh-nodejs10-nodejs | <0:10.16.3-3.el7 | 0:10.16.3-3.el7 |
redhat/httpd24-httpd | <0:2.4.34-8.el7.1 | 0:2.4.34-8.el7.1 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7.1 | 0:1.7.1-7.el7.1 |
redhat/rh-nodejs8 | <0:3.0-5.el7 | 0:3.0-5.el7 |
redhat/rh-nodejs8-nodejs | <0:8.16.1-2.el7 | 0:8.16.1-2.el7 |
redhat/Nodejs | <8.16.1 | 8.16.1 |
redhat/Nodejs | <10.16.3 | 10.16.3 |
redhat/Nodejs | <12.8.1 | 12.8.1 |
Apple Swiftnio | >=1.0.0<=1.4.0 | |
Apple Mac OS X | >=10.12 | |
Canonical Ubuntu Linux | >=14.04 | |
Apache HTTP server | >=2.4.20<2.4.40 | |
Apache Traffic Server | >=6.0.0<=6.2.3 | |
Apache Traffic Server | >=7.0.0<=7.1.6 | |
Apache Traffic Server | >=8.0.0<=8.0.3 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Synology DiskStation Manager | =6.2 | |
Synology Skynas | ||
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Redhat Jboss Core Services | =1.0 | |
Redhat Jboss Enterprise Application Platform | =7.2.0 | |
Redhat Jboss Enterprise Application Platform | =7.3.0 | |
Redhat Openshift Service Mesh | =1.0 | |
Redhat Quay | =3.0.0 | |
Redhat Software Collections | =1.0 | |
Redhat Enterprise Linux | =8.0 | |
Oracle Communications Element Manager | =8.0.0 | |
Oracle Communications Element Manager | =8.1.0 | |
Oracle Communications Element Manager | =8.1.1 | |
Oracle Communications Element Manager | =8.2.0 | |
Oracle GraalVM | =19.2.0 | |
Oracle Instantis Enterprisetrack | >=17.1<=17.3 | |
Oracle Retail Xstore Point of Service | =7.1 | |
McAfee Web Gateway | >=7.7.2.0<7.7.2.24 | |
McAfee Web Gateway | >=7.8.2.0<7.8.2.13 | |
McAfee Web Gateway | >=8.1.0<8.2.0 | |
NetApp Clustered Data ONTAP | ||
Nodejs Node.js | >=8.0.0<=8.8.1 | |
Nodejs Node.js | >=8.9.0<8.16.1 | |
Nodejs Node.js | >=10.0.0<=10.12.0 | |
Nodejs Node.js | >=10.13.0<10.16.3 | |
Nodejs Node.js | >=12.0.0<12.8.1 | |
All of | ||
Apple Swiftnio | >=1.0.0<=1.4.0 | |
Any of | ||
Apple Mac OS X | >=10.12 | |
Canonical Ubuntu Linux | >=14.04 | |
All of | ||
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u1 2.4.62-1~deb12u2 2.4.62-3 |
The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps: 1. Stop httpd service: $ systemctl stop httpd 2. Remove http/2 protocol support from configuration files: $ sed -i 's/\(h2\)\|\(h2c\)//g' <httpd_config_file> 3. Validate configuration files to make sure all syntax is valid: $ apachectl configtest 4. Restart httpd service: $ systemctl start httpd
Disable http2 support
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2019-9517.
The severity of CVE-2019-9517 is high.
HTTP/2 implementations such as Nodejs (versions 8.16.1, 10.16.3, 12.8.1) and jbcs-httpd24-* (various versions) are affected by CVE-2019-9517.
To fix CVE-2019-9517, you should update your affected software to the recommended versions provided by the vendor.
You can find more information about CVE-2019-9517 on the Red Hat Bugzilla website.